Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers / / edited by Stefan Mangard, Axel Y. Poschmann |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 271 p. 87 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Management information systems Computer science Algorithms Computer science—Mathematics Cryptology Computer Communication Networks Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-21476-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Side-Channel Attacks -- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements -- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) -- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits -- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks -- Two Operands of Multipliers in Side-Channel Attack -- FPGA Countermeasures -- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs -- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware -- Timing Attacks and Countermeasures -- A Faster and More Realistic Flush+Reload Attack on AES -- Faster software for fast endomorphisms -- Toward Secure Implementation of McEliece Decryption -- Fault Attacks -- Fault Injection with a new favor: Memetic Algorithms make a difference -- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers -- A Biased Fault Attack on the Time Redundancy Countermeasure for AES -- Countermeasures -- Faster Mask Conversion with Lookup Tables -- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC -- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs -- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment. |
Record Nr. | UNISA-996204581803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Constructive Side-Channel Analysis and Secure Design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers / / edited by Stefan Mangard, Axel Y. Poschmann |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 271 p. 87 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Management information systems Computer science Algorithms Computer science—Mathematics Cryptology Computer Communication Networks Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-21476-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Side-Channel Attacks -- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements -- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) -- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits -- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks -- Two Operands of Multipliers in Side-Channel Attack -- FPGA Countermeasures -- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs -- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware -- Timing Attacks and Countermeasures -- A Faster and More Realistic Flush+Reload Attack on AES -- Faster software for fast endomorphisms -- Toward Secure Implementation of McEliece Decryption -- Fault Attacks -- Fault Injection with a new favor: Memetic Algorithms make a difference -- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers -- A Biased Fault Attack on the Time Redundancy Countermeasure for AES -- Countermeasures -- Faster Mask Conversion with Lookup Tables -- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC -- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs -- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment. |
Record Nr. | UNINA-9910484333203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptographic Hardware and Embedded Systems -- CHES 2010 [[electronic resource] ] : 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings / / edited by Stefan Mangard, Francois-Xavier Standaert |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 458 p. 142 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Coding theory Information theory Data structures (Computer science) Computer security Algorithms Computer science—Mathematics Cryptology Coding and Information Theory Data Structures and Information Theory Systems and Data Security Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-642-15031-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Low Cost Cryptography -- Quark: A Lightweight Hash -- PRINTcipher: A Block Cipher for IC-Printing -- Sponge-Based Pseudo-Random Number Generators -- Efficient Implementations I -- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over -- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves -- Efficient Techniques for High-Speed Elliptic Curve Cryptography -- Side-Channel Attacks and Countermeasures I -- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 -- New Results on Instruction Cache Attacks -- Correlation-Enhanced Power Analysis Collision Attack -- Side-Channel Analysis of Six SHA-3 Candidates -- Tamper Resistance and Hardware Trojans -- Flash Memory ‘Bumping’ Attacks -- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection -- When Failure Analysis Meets Side-Channel Attacks -- Efficient Implementations II -- Fast Exhaustive Search for Polynomial Systems in -- 256 Bit Standardized Crypto for 650 GE – GOST Revisited -- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES -- SHA-3 -- Developing a Hardware Evaluation Method for SHA-3 Candidates -- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs -- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures -- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework -- Fault Attacks and Countermeasures -- Public Key Perturbation of Randomized RSA Implementations -- Fault Sensitivity Analysis -- PUFs and RNGs -- An Alternative to Error Correction for SRAM-Like PUFs -- New High Entropy Element for FPGA Based True Random Number Generators -- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes -- New Designs -- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs -- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware -- Side-Channel Attacks and Countermeasures II -- Provably Secure Higher-Order Masking of AES -- Algebraic Side-Channel Analysis in the Presence of Errors -- Coordinate Blinding over Large Prime Fields. |
Record Nr. | UNISA-996466292203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptographic hardware and embedded systems--CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings / / Stefan Mangard, Francois-Xavier Standaert (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, 2010 |
Descrizione fisica | 1 online resource (XIII, 458 p. 142 illus.) |
Disciplina | 005.8 |
Altri autori (Persone) |
MangardStefan
StandaertFrancois-Xavier |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Embedded computer systems
Cryptography Computer security |
ISBN | 3-642-15031-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Low Cost Cryptography -- Quark: A Lightweight Hash -- PRINTcipher: A Block Cipher for IC-Printing -- Sponge-Based Pseudo-Random Number Generators -- Efficient Implementations I -- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over -- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves -- Efficient Techniques for High-Speed Elliptic Curve Cryptography -- Side-Channel Attacks and Countermeasures I -- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 -- New Results on Instruction Cache Attacks -- Correlation-Enhanced Power Analysis Collision Attack -- Side-Channel Analysis of Six SHA-3 Candidates -- Tamper Resistance and Hardware Trojans -- Flash Memory ‘Bumping’ Attacks -- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection -- When Failure Analysis Meets Side-Channel Attacks -- Efficient Implementations II -- Fast Exhaustive Search for Polynomial Systems in -- 256 Bit Standardized Crypto for 650 GE – GOST Revisited -- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES -- SHA-3 -- Developing a Hardware Evaluation Method for SHA-3 Candidates -- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs -- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures -- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework -- Fault Attacks and Countermeasures -- Public Key Perturbation of Randomized RSA Implementations -- Fault Sensitivity Analysis -- PUFs and RNGs -- An Alternative to Error Correction for SRAM-Like PUFs -- New High Entropy Element for FPGA Based True Random Number Generators -- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes -- New Designs -- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs -- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware -- Side-Channel Attacks and Countermeasures II -- Provably Secure Higher-Order Masking of AES -- Algebraic Side-Channel Analysis in the Presence of Errors -- Coordinate Blinding over Large Prime Fields. |
Altri titoli varianti | CHES 2010 |
Record Nr. | UNINA-9910484204303321 |
Berlin, : Springer, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Radio Frequency Identification [[electronic resource] ] : 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers / / edited by Stefan Mangard, Patrick Schaumont |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 175 p. 57 illus.) |
Disciplina | 621 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems E-commerce Systems and Data Security Cryptology Computer Communication Networks e-Commerce/e-business |
ISBN | 3-319-24837-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | PUFs and Applications -- RFID System Attacks -- Efficient Implementations. |
Record Nr. | UNISA-996466304303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Radio Frequency Identification : 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers / / edited by Stefan Mangard, Patrick Schaumont |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 175 p. 57 illus.) |
Disciplina | 621 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems E-commerce Systems and Data Security Cryptology Computer Communication Networks e-Commerce/e-business |
ISBN | 3-319-24837-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | PUFs and Applications -- RFID System Attacks -- Efficient Implementations. |
Record Nr. | UNINA-9910482964103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Card Research and Advanced Applications [[electronic resource] ] : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers / / edited by Stefan Mangard |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 297 p. 98 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Software engineering Computer security Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Software Engineering Systems and Data Security |
ISBN | 3-642-37288-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection -- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks with Localization-Agnostic Fault -- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards -- On the Use of Shamir’s Secret Sharing against Side-Channel Analysis -- Secure Multiple SBoxes Implementation with Arithmetically Masked Input -- Low-Cost Countermeasure against RPA -- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models -- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices -- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices -- Putting together What Fits together - GrÆStl -- Memory Access Pattern Protection for Resource-Constrained Devices -- Multipurpose Cryptographic Primitive ARMADILLO3 -- Improving Side-Channel Analysis with Optimal Linear Transforms -- SCA with Magnitude Squared Coherence -- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis -- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines -- Defensive Leakage Camouflage. |
Record Nr. | UNISA-996465573003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Card Research and Advanced Applications : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers / / edited by Stefan Mangard |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 297 p. 98 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Software engineering Computer security Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Software Engineering Systems and Data Security |
ISBN | 3-642-37288-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection -- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks with Localization-Agnostic Fault -- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards -- On the Use of Shamir’s Secret Sharing against Side-Channel Analysis -- Secure Multiple SBoxes Implementation with Arithmetically Masked Input -- Low-Cost Countermeasure against RPA -- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models -- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices -- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices -- Putting together What Fits together - GrÆStl -- Memory Access Pattern Protection for Resource-Constrained Devices -- Multipurpose Cryptographic Primitive ARMADILLO3 -- Improving Side-Channel Analysis with Optimal Linear Transforms -- SCA with Magnitude Squared Coherence -- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis -- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines -- Defensive Leakage Camouflage. |
Record Nr. | UNINA-9910483355603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|